Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Research on Cybersecurity Threat Prediction and Prevention Technology for Intelligent Housing Combined with Edge Computing

View through CrossRef
As an important application scenario for the development of Internet of Things (IoT) technology, smart housing is facing unprecedented challenges in its network security. The traditional centralized security protection architecture in the face of large-scale distributed smart devices have problems such as high latency, slow response, etc., and it is difficult to meet the real-time threat detection and protection needs. Aiming at the problems of insufficient real-time threat detection and limited protection effect of smart housing network security, this paper proposes a smart housing network security threat prediction and prevention technology combined with edge computing. First of all, the distributed security monitoring architecture based on edge computing nodes is constructed, the K-means clustering algorithm is used for network traffic anomaly detection, the support vector machine is used to achieve threat intrusion identification, and the dynamic heterogeneous redundancy adaptive defense mechanism is established; then, the multilayer threat detection model is designed, and the behavioral anomaly analysis and threat prediction are combined with machine learning algorithms; finally, the edge infrastructure is secured and trusted through the edge, data security and network security three-layer protection system to build a complete security prevention framework. The experimental results show that the data processing rate of the system reaches 2350 items/s, the mean value of threat detection error is 0.396, the monthly average defense rate reaches 96.262%, and the path interception probability is as low as 0.935.The research results validate the effectiveness of the edge computing technology in the prediction and prevention of network security threats in smart housing, and provide new technical paths for the construction of efficient real-time security protection system of smart housing. The results verify the effectiveness of edge computing technology in the prediction and prevention of smart housing network security threats, and provide a new technical path for building an efficient real-time smart housing security protection system.
Title: Research on Cybersecurity Threat Prediction and Prevention Technology for Intelligent Housing Combined with Edge Computing
Description:
As an important application scenario for the development of Internet of Things (IoT) technology, smart housing is facing unprecedented challenges in its network security.
The traditional centralized security protection architecture in the face of large-scale distributed smart devices have problems such as high latency, slow response, etc.
, and it is difficult to meet the real-time threat detection and protection needs.
Aiming at the problems of insufficient real-time threat detection and limited protection effect of smart housing network security, this paper proposes a smart housing network security threat prediction and prevention technology combined with edge computing.
First of all, the distributed security monitoring architecture based on edge computing nodes is constructed, the K-means clustering algorithm is used for network traffic anomaly detection, the support vector machine is used to achieve threat intrusion identification, and the dynamic heterogeneous redundancy adaptive defense mechanism is established; then, the multilayer threat detection model is designed, and the behavioral anomaly analysis and threat prediction are combined with machine learning algorithms; finally, the edge infrastructure is secured and trusted through the edge, data security and network security three-layer protection system to build a complete security prevention framework.
The experimental results show that the data processing rate of the system reaches 2350 items/s, the mean value of threat detection error is 0.
396, the monthly average defense rate reaches 96.
262%, and the path interception probability is as low as 0.
935.
The research results validate the effectiveness of the edge computing technology in the prediction and prevention of network security threats in smart housing, and provide new technical paths for the construction of efficient real-time security protection system of smart housing.
The results verify the effectiveness of edge computing technology in the prediction and prevention of smart housing network security threats, and provide a new technical path for building an efficient real-time smart housing security protection system.

Related Results

Housing Improvements for Health and Associated Socio‐Economic Outcomes: A Systematic Review
Housing Improvements for Health and Associated Socio‐Economic Outcomes: A Systematic Review
Poor housing is associated with poor health. This suggests that improving housing conditions might lead to improved health for residents. This review searched widely for studies fr...
An analysis on housing affordability in Malaysian housing markets and the home buyers’ preference
An analysis on housing affordability in Malaysian housing markets and the home buyers’ preference
Purpose This paper aims to investigate the housing preference and housing affordability in Malaysian housing markets. There is a lack of research on the gap betwe...
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Purpose The accelerated digital transformation and the growing emphasis on privacy, safety and security present ongoing challenges for cybersecurity experts. Alongside these challe...
Magic graphs
Magic graphs
DE LA TESIS<br/>Si un graf G admet un etiquetament super edge magic, aleshores G es diu que és un graf super edge màgic. La tesis està principalment enfocada a l'estudi del c...
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
<div class="section abstract"> <div class="htmlview paragraph">This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and ...
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
<div class="section abstract"> <div class="htmlview paragraph">This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and ...
Housing Discourse: Historical development, epistemological gap and sociological modeling
Housing Discourse: Historical development, epistemological gap and sociological modeling
<p>Housing issue is essentially major social issue. Even though housing is vital for individual life and social life, the attention given to its theorization and epistemologi...

Back to Top